The breakup of the Soviet Union, the end of the Cold War, and other national and international events of recent history have enabled our national leadership to reconsider the constraints placed on both classified and unclassified Government information. The flow of information to the public which began with the Openness Initiative of the Secretary of Energy was reinforced by President Clinton's Executive Order (E.O.) 12958, "Classified National Security Information," signed on April 17, 1995, effective on October 16, 1995. Both of these actions have revolved around a trust to the people of this nation to insure a better Government through the release to the general public of formerly inaccessible information that led to policy in the past and still impacts on policy development today.
E.O. 12958, "Classified National Security Information," in response to the dramatic reduction of security threats confronted by the nation, implements the President's commitment to open Government. It reverses previous classification policy, and unless positive action is taken to show that National Security Information (NSI) contained in documents of permanent historical value 25 years or older is still sensitive and should continue to be protected, such documents will be declassified. There is a 5-year period (ending April 16, 2000) to allow such documents to be reviewed and sensitivities determined before automatic declassification is implemented. At the end of this period, documents which are of permanent historical value, are 25 years or older, and have not been positively shown to require continued protection (even if not yet reviewed) will be automatically declassified. Automatic declassification does not apply to requirements made under the Atomic Energy Act of 1954, as amended. This exemption to automatic declassification applies to information classified as Restricted Data (RD) and Formerly Restricted Data (FRD).
The purpose of this guide is to provide assistance to personnel reviewing files which may include Department of Energy (DOE) classified information contained in documents considered for automatic declassification under the provisions of the E.O. Only personnel from the DOE and other agencies who have been trained and authorized by DOE may use this document as authority to declassify DOE NSI written prior to 1976 within their agency's files.
This order, dated April 17, 1995, and effective October 16, 1995, prescribes a uniform system for classifying, safeguarding, and declassifying NSI.
Under section 6.1 of the E.O., "Nothing within this order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended, or the National Security Act of 1947, as amended. Restricted Data' and Formerly Restricted Data' shall be handled, protected, classified, downgraded, and declassified in conformity with provisions of the Atomic Energy Act of 1954, as amended, and the regulations issued under that Act." Therefore, RD and FRD are specifically excluded from the provisions of the E.O.
Automatic Declassification (section 3.4)
- "(a) Subject to paragraph (b), below, within 5 years from the date of this order, all classified information contained in records that (1) are more than 25 years old, and (2) have been determined to have permanent historical value under title 44, United States Code, shall be automatically declassified whether or not the records have been reviewed. Subsequently, all classified information in such records shall be automatically declassified no longer than 25 years from the date of its original classification, except as provided in paragraph (b), below.
- (b) An agency head may exempt from automatic declassification under paragraph (a), above, specific information, the release of which should be expected to:
- (1) reveal the identity of a confidential human source, or reveal information about the application of an intelligence source or method, or reveal the identity of a human intelligence source when the unauthorized disclosure of that source would clearly and demonstrably damage the national security interest of the United States;
- (2) reveal information that would assist in the development or use of weapons of mass destruction;
- (3) reveal information that would impair U.S. cryptologic systems or activities;
- (4) reveal information that would impair the application of state of the art technology within a U.S. weapon system;
- (5) reveal actual U.S. military war plans that remain in effect;
- (6) reveal information that would seriously and demonstrably impair relations between the United States and a foreign government, or seriously and demonstrably undermine ongoing diplomatic activities of the United States;
- (7) reveal information that would clearly and demonstrably impair the current ability of United States Government officials to protect the President, Vice President, and other officials for whom protection services, in the interest of national security, are authorized;
- (8) reveal information that would seriously and demonstrably impair the current national security emergency preparedness plans; or
- (9) violate a statute, treaty, or international agreement."
Applying the guidance cited above, DOE has identified the following subject areas as containing selected information which requires continued protection under the provisions of the E.O. because of their continuing sensitivity. (Squared brackets are used to identify the appropriate portion of paragraph 3.4(b) of the Executive Order 12958 under which the exemption falls for that particular subject area. [3.4(b)(2)] means exemption 2 in paragraph 3.4(b).) DOE exempted NSI includes only the following subject areas which:
These are the only NSI subject areas that DOE desires to continue to protect in documents that are older than 1976 and have permanent historical value. Even though the documents within these subject areas are exempt from automatic declassification, they are still subject to mandatory and systematic declassification review under the provisions of the E.O.
This guide is designed to be an aid in the declassification of DOE NSI contained in documents originating prior to 1976 only. No RD or FRD information is covered by this guide. The E.O. specifically exempts RD and FRD information from automatic declassification.
The DOE NSI documents, prior to 1976, were originated by DOE's predecessors: the Manhattan Engineering District; the Atomic Energy Commission (AEC); and the Energy Research and Development Agency (ERDA). Historically, this was work done for other agencies and not actually contained within DOE documents. Within this document population, there is a subset of DOE information which falls within the eleven subject areas discussed above for exemption. In conjunction with the above reasoning, DOE has always used topical guidance for its classification guides with very specific and detailed guidance. These classification guides are periodically reviewed and updated to reflect changing sensitivities and resultant changes in the protection afforded the subject of the topic. A survey of topical guidance has shown that there is no significant change in the required level of protection for DOE NSI. Therefore, the declassification of DOE NSI documents originating prior to 1976 is not a matter of topical classification changes or classification downgrading, but rather a conscientious decision on whether relatively old (prior to 1976) documents with permanent historical value should continue to be protected in light of the current world situation. To implement this decision, the guide provides a "GO/NO GO" approach to answering the declassification question. Therefore, within this guide, the only specific guidance is "unclassified" or "retain classification."
Additionally, for the purposes of the NSI reviewers, all of the following topics are considered unclassified:
This guidance is contained in the DOE publication Drawing Back the Curtain of Secrecy, RDD-2, dated January 1, 1995, which also contains additional information on unclassified subject areas.
This guide will provide the basis for a document by document review for exempted information under the provisions of section 3.4(d) of the E.O. For any topics which are not identified within this guide but which must have the classification retained, DOE will submit a letter of justification to the Information Security Oversight Office (ISOO) amending the guide. Pending receipt of a response from ISOO, the documents containing the information in question will remain classified.
If documents are discovered during a review which appear to contain classified information but are not marked as being classified, the documents will be held and protected as classified until it is reviewed by DOE, or DOE contractor, authorized derivative classifier (ADC) using the appropriate topical classification guide and procedures. Final decision of classification will rest with the ADC.
The Appendix of this guide discusses how to determine if a document being reviewed contains potential RD and FRD information. Reviewers who are not authorized by DOE to declassify such documents should not attempt final determinations. Refer to the Appendix for additional instructions on how to deal with potential RD and FRD. If the reviewer, using the information provided in the Appendix, suspects that a NSI classified, or unmarked, document may contain RD/FRD, the document should be controlled and marked
"MAY CONTAIN RESTRICTED DATA
NOT SUBJECT TO AUTOMATIC DECLASSIFICATION Requires review by the Department of Energy prior to public release" |
Directions for further action should then be requested from the following contact in the Office of Declassification, DOE: Document Declassification Division, (301) 903-4199.
The NSI written prior to 1976 which the DOE is exempting from automatic declassification is contained in a very narrowly defined group of subjects. The reason for continued protection of these subjects is that they provide insight into, or border very closely on, RD and/or FRD information. DOE's Order 5650.2B, "Identification of Classified Information," mandates a 2-year periodic review of all DOE classification guides. The requirement for the review is as follows:
Chapter V, Part B, Paragraph 4 - "Each DOE or DOE contractor organization shall review each classification guide it issues at least every 2 years to ensure that such guides do not contradict current classification policy. If the review indicates that the guide does not contradict such policy, the reviewer shall annotate the record copy of the guide with the results and date of the review. If the review indicates that the guide does contradict such policy, the issuing organization shall also note the nature of the problem and the nature of and schedule for planned corrective action."
This Order also applies to this guide, mandating at least a 2-year periodic review to assure that DOE NSI is declassified when protection for national security reasons is no longer necessary. Therefore, the declassification date or event (DDE), required by the E.O., is periodically updated as a part of the biennial updating of this document. Markings on documents reviewed using this guide will reflect this DDE philosophy.
Specific DDEs for each exempted subject area are included as a section at the end of each chapter. The specific DDEs and the general topic areas to which they apply within each chapter are listed at the end of the applicable chapter.
When the guide is updated, changes from "retain classification" to "unclassified" will be clearly marked. Any document reviewed using this guide will be prominently marked as such on the front cover, citing use of the guide (DOE CG-HR-1) and the specific guidance(s) used to retain the classification (10.1, 2.1, etc.). This will facilitate future reviews of the documents after update of this guide.
This guide is designed for use by personnel authorized by DOE to review and declassify DOE NSI originating prior to 1976 deemed to be of significant historical value. To use this guide, the following must be remembered:
This chapter is for use by personnel certified by DOE to declassify DOE National Security Information (NSI) of permanent historical value originated prior to 1976 concerning DOE safeguards and security information. Documents containing Restricted Data (RD) and Formerly Restricted Data (FRD) are not addressed by this document and retain present classification.
This chapter provides the guidance for declassification of DOE National Security Information (NSI) contained in documents originated prior to 1976 pertaining to DOE nuclear safeguards and security information. These documents may be exempted from automatic declassification provisions of Executive Order (E.O.) 12958. The authority for exemption from automatic declassification is sections 3.4(b)(1), (2) and (3) of E.O. 12958 which read:
- "(b) An agency head may exempt from automatic declassification . . . , specific information, the release of which is expected to:
- (1) reveal the identity of a confidential human source, or reveal information about the application of an intelligence source or method, or reveal the identity of a human intelligence source when the unauthorized disclosure of that source would clearly and demonstrably damage the national security interest of the United States;
- (2) reveal information that would assist in the development or use of weapons of mass destruction;
- (3) reveal information that would impair U. S. cryptologic system or activities."
Safeguards and security information refers to information concerning the safeguarding of DOE nuclear materials and the security of DOE facilities and assets.
The best designed and most conscientiously operated protection system can, with some probability, be defeated by an adversary with sufficient resources and information. Information whose dissemination has the potential for significantly lowering the resources needed for a successful attack or for significantly increasing the probability of success should be protected. The principal reason for classifying DOE safeguards and security information is to deny the release of information that will assist a malefactor.
Certain information concerning the protection of a DOE facility would be of great value to a malefactor. This information would defeat any deterrent values of security systems, while allowing the adversary to (1) plan an attack; (2) circumvent, bypass, or disable security system components; or (3) defeat protective force efforts to neutralize an attack. Areas of DOE safeguards and security interests include (1) the safeguards and security concerning an automated information system (AIS), (2) communications security (COMSEC), (3) vulnerabilities information, (4) control and accountability of nuclear materials, (5) operations security (OPSEC), (6) malevolent dispersal of radioactive material, (7) nuclear threat messages, and (8) technical surveillance countermeasures (TSCM).
The term automated information system (AIS) is defined as "any equipment or interconnected system or subsystem or equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data, to include computer software, firmware, and hardware. Included in this definition are word processors, microprocessors, personal computers, controllers, automated office support systems (AOSS), memory typewriters, and other stand-alone or special computer systems."
Communications security (COMSEC) means protective measures taken to deny unauthorized persons information derived from telecommunications of the United States government related to national security and to ensure the authenticity of such communications. Such protection results from the application of security measures (including cryptosecurity, transmission security, and emission security) to electrical systems generating, handling, processing, or using national security or national security related information. It also includes the application of physical security measures to communications security information or materials. The classification of all COMSEC equipment and related documentation is determined by the Director, National Security Agency (NSA). Large amounts of classified information are channeled into communication centers and distributed via communications systems. Thus, COMSEC is vitally important to ensure that the communications systems of these locations and the information associated with them are not compromised.
OPSEC is defined by DOE as a program designed to disrupt or defeat the ability of foreign intelligence services or other adversaries to exploit sensitive DOE activities or information and to prevent the unauthorized disclosure of such information. Sensitive activities are defined as classified and unclassified facilities, programs, operations, inquiries, investigations, research, exercises, tests, training, and other functions of the Department, or its contractors that, if disclosed, could reasonably be expected to adversely affect the national security. Since DOE and contractor operations include a variety of sensitive activities, applicable OPSEC measures likewise cover a wide range and tend to be oriented toward highly specific facilities or operations.
Modern intelligence collection utilizes equipment and devices incorporating state-of-the-art technology to accomplish technical penetrations of targeted areas. Such intelligence gathering devices have been discovered in U.S. facilities throughout the world. The detection of a clandestine installed device is extremely difficult. The purpose of the Technical Surveillance Countermeasures (TSCM) program is to detect and deter such intelligence collection.
Although much information concerning safeguards and security, particularly general information regarding this subject area, is unclassified, certain information that would be beneficial to a malefactor in targeting, planning, and executing an attack against DOE nuclear facilities, nuclear materials or nuclear weapons, has properly been classified for national security reasons. Some of this classified safeguards and security information, however, has lost its sensitivity with the passage of time and should be declassified. Indeed, significant amounts of safeguards and security information in historical documents still bearing classification markings no longer warrants protection as classified information.
For example, information concerning safeguards and security vulnerability information becomes declassifiable upon correction of the vulnerability. When these vulnerabilities have been corrected, the document describing the vulnerability should be declassified. Even where explicit information is not readily available indicating the correction of a vulnerability. information 25 or more years old, concerning a specific vulnerability at a site or facility is too dated to be of use to a malefactor and should be declassified.
However, some safeguards and security information requires continued protection because it reveals details indicative of safeguards and security methodology, planning, systems, and operations in use today or evolutionary in nature from earlier methods, planning, etc. Such information may provide insight into current safeguards and security measures and may warrant exemption from automatic declassification.
Similarly, limited information concerning material accountability has lost its sensitivity with time. Historical information regarding special nuclear material (SNM) inventory differences (IDs) would not be useful today to a malefactor in diverting or stealing SNM, or making a current credible nuclear threat, and is, therefore, declassified. Other historical information about material accountability and control, however, requires protection because it may reveal information about allocations of SNM to atomic energy defense activities (e.g., nuclear weapons design or naval nuclear propulsion).
Information concerning OPSEC could lead to its use by a malefactor and possibly to a loss of classified information, and should therefore not be automatically declassified.
A malefactor who wishes to initiate a highly significant dispersal of radioactive material, or to threaten such dispersal, would almost always require multiple acts (e.g., releasing radioactivity by an explosion or other act while almost simultaneously destroying safety and/or containment systems, or the theft of radioactive sources followed by an explosion, or other means of dispersal). Information that can be protected and that would be useful to a malefactor in effecting a highly significant dispersal of radioactive material should remain classified. By restricting access to the information, the consequences of a dispersion attempt could be decreased and the effort and knowledge required by the malefactor would be increased.
Another concern of DOE is the assessment of, and response to, threat messages. Threat messages received in the past have established a need to prepare for this situation in the future. An important consideration is the credibility of the threat messages. Techniques have been developed that attempt to establish this credibility. With regard to nuclear threat messages in general, the fact that a nuclear threat message was received by DOE or other cleared agencies is no longer sensitive if revealed in historical classified documents over 25 years old. However, other information, actual analysis of such information and responses to them warrants exemption from automatic declassification because such dated information may still be of great value to a malefactor today.
Discussion of the technical surveillance threat in terms of specifics is classified because DOE does not want to provide information to a that will assist in their countering our selection of procedures, methods, or equipment. Detailed descriptions of TSCM capabilities and limitations are classified for the same reason. Some facts uncovered by TSCM surveys, inspections and monitors may be exempt from automatic declassification to avoid assisting potential adversaries today.
Any DOE NSI originated prior to 1976 containing information concerning DOE safeguards and security information not delineated in specific guidance listed below is unclassified. This does not include information classified by statute such as the Atomic Energy Act (AEA) of 1954, as amended. RD and FRD shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the AEA and regulations issued under that Act.
The Appendix of this guide discusses how to determine if a document being reviewed contains potential RD and FRD information. Reviewers who are not authorized by DOE to declassify such documents should not attempt final determinations. Refer to the Appendix for additional instructions on how to deal with potential RD and FRD.
2.1 Threat description in documents dated prior to 1976 | Unclassified | ||
2.2 Selection criteria for national security assets | Unclassified | ||
2.3 Policy information, such as DOE orders, safeguards and security guides, security and classification policy, requirements, and procedures information. | Unclassified | ||
2.4 The physical security plan or security system design for a facility or site of national security interest | |||
2.4.1 Facility and site description | Unclassified | ||
2.4.2 System design, operation, etc. | Unclassified | ||
2.4.3 Information about in-place security computer system | Retain Classification
[25x2; EO 12958] |
||
2.4.4 Protective personnel requirements armaments response times, contingency plans, etc | Retain Classification
[25x2; EO 12958] |
||
2.5 Security measures concerning an automated information security (AIS) system | |||
2.5.1 If the specific system is known to be obsolete or no longer currently in use | Unclassified | ||
2.5.2 Otherwise | Retain Classification
[25x2; EO 12958] |
||
2.5.3 Government or government supported contractor analyses (including risk analyses) in the AIS system. | Retain Classification
[25x2; EO 12958] |
||
2.6 Communications Security (COMSEC) | Retain Classification
[25x2&3; EO 12958] |
||
2.7 Vulnerabilities Information | Unclassified | ||
2.8 Control and Accountability of DOE Nuclear Materials | |||
2.8.1 Inventory difference information or information concerning an inability to locate missing item or quantity of SNM | Unclassified | ||
2.8.2 Total site inventory of SNM | Unclassified | ||
NOTE: Applies only to inventory of SNM at the total site level that is classified as NSI. | |||
2.8.3 Otherwise | Retain Classification
[25x2; EO 12958] |
||
2.9 Operations Security (OPSEC) | Retain Classification
[25x2; EO 12958] |
||
2.10 Malevolent Dispersal of Radioactive Material | |||
2.10.1 Highly significant malevolent dispersal scenarios and vulnerability analyses | |||
2.10.1.1 Trivial or generally known methodology | Unclassified | ||
2.10.1.2 Otherwise | Retain Classification
[25x2; EO 12958] |
||
2.10.2 Results of tests and dispersal experiments that could be applied to malevolent dispersals from a DOE facility | Retain Classified
[25x2; EO 12958] |
||
2.10.3 Details of methods that could be applied to initiate a highly significant malevolent dispersal | |||
2.10.3.1 Generic description of methods that could be used to disperse radioactive material (e.g., fire, explosives) | Unclassified | ||
2.10.3.2 Otherwise | Retain Classification
[25x2; EO 12958] |
||
2.10.4 Tests of effects of attacks on heavy shipping containers | Retain Classification
[25x2; EO 12958] |
||
2.11 Nuclear threat messages | |||
2.11.1 Fact that a nuclear threat message was received by a facility or organization | |||
2.11.1.1 The general contents (or case histories) without details | Unclassified | ||
2.11.1.2 Detailed situations or individual case histories, including technical and psychological credibility factors, of studies | Retain Classification
[25x2; EO 12958] |
||
2.11.1.3 Analytical techniques used or analyses or threat messages | Retain Classification
[25x2; EO 12958] |
||
2.11.2 Questions chosen to extract information from malefactors | |||
2.11.2.1 A list of questions without elaboration | Unclassified | ||
2.11.2.2 A list of questions with elaboration | Retain Classification
[25x2; EO 12958] |
||
2.12 Technical Surveillance Countermeasures (TSCM) | Retain Classification
[25x1; EO 12958] |
||
DECLASSIFICATION DATE OR EVENT (DDE) | SUBJECT | ||
Upon correction of the vulnerability or when information is 25 years old or older | Security vulnerabilities | ||
When specific system is no longer in use | Security measures for automated information systems (AIS) | ||
Upon completion of investigation and correction of underlying vulnerabilities or when any inventory difference information is 25 years old or older | Inventory difference or inability to locate a missing item or quantity of special nuclear material (SNM) |